Skip to content

Latest commit

 

History

History
1140 lines (991 loc) · 115 KB

CHANGELOG.md

File metadata and controls

1140 lines (991 loc) · 115 KB

Change Log

v1.3.0 (2017-05-31)

All Commits

Enhancements:

Bug fixes:

Documentation:

Misc:

v1.3.0-rc3 (2017-05-24)

All Commits

Enhancements:

Bug fixes:

Documentation:

v1.3.0-rc2 (2017-05-16)

All Commits

Enhancements:

  • Fixed ReplacePath rule executing out of order, when combined with PathPrefixStrip #1577 (aantono)

Bug fixes:

Documentation:

v1.3.0-rc1 (2017-05-05)

All Commits

Enhancements:

Bug fixes:

Documentation:

Misc:

v1.2.3 (2017-04-13)

Full Changelog

Merged pull requests:

v1.2.2 (2017-04-11)

Full Changelog

Merged pull requests:

v1.2.1 (2017-03-27)

Full Changelog

Merged pull requests:

v1.2.0 (2017-03-20)

Full Changelog

Merged pull requests:

v1.2.0-rc2 (2017-03-01)

Full Changelog

Implemented enhancements:

  • Are there plans to support the service type ExternalName in Kubernetes? #1142
  • Kubernetes Ingress and sticky support #911
  • kubernetes client does not support InsecureSkipVerify #876
  • Support active health checking like HAProxy #824
  • Allow k8s ingress controller serviceAccountToken and serviceAccountCACert to be changed #611

Fixed bugs:

  • [rancher] invalid memory address or nil pointer dereference #1134
  • Kubernetes default backend should work #1073

Closed issues:

  • Are release Download links broken? #1201
  • Bind to specific ip address #1193
  • DNS01 challenge use the wrong zone through route53 #1192
  • Reverse proxy https to http backends fails #1180
  • Swarm Mode + Letsecrypt + KV Store #1176
  • docker deploy -c example.yml e #1169
  • Traefik not finding dynamically added services (Docker Swarm Mode) #1168
  • Traefik with Kubernetes backend - keep getting 401 on all GET requests to kube-apiserver #1166
  • Near line 15 (last key parsed 'backends.backend-monitor-viz.servers'): Key 'backends.backend-monitor-viz.servers.server-monitor_viz-1' has already been defined. #1154
  • How to reuse SSL certificates automatically fetched from Let´s encrypt? #1152
  • Dynamically ban ip when backend repeatedly returns specified status code. ( 403 ) #1136
  • Always get 404 accessing my nginx backend service #1112
  • Incomplete Docu #1091
  • LoadCertificateForDomains: runtime error: invalid memory address #1069
  • Traefik creating backends & mappings for ingress annotated with ingress.class: nginx #1058
  • ACME file format description #1012
  • SwarmMode - Not routing on worker node #838
  • Migrate k8s to kubernetes/client-go #678
  • Support for sticky session with kubernetes ingress as backend #674

Merged pull requests:

v1.2.0-rc1 (2017-02-06)

Full Changelog

Implemented enhancements:

  • Add FreeBSD and OpenBSD to release builds #923
  • Write authenticated user to header key #802
  • Question: Wildcard Host for Kubernetes Ingress #792
  • First commit prometheus middleware. #1022 (enxebre)
  • Use deployment primitives from travis #843 (guilhem)

Fixed bugs:

  • Increase Docker API version to work with Windows Containers #1094

Closed issues:

  • How could I know whether forwarding path is correctly set? #1111
  • ACME + Docker-compose labels #1099
  • Loadbalance between 2 containers in Docker Swarm Mode #1095
  • Add DNS01 letsencrypt challenge support through AWS. #1093
  • New Release Cut #1092
  • Marathon integration changed default backend server port from task-level to application-level #1072
  • websockets not working when compress = true in toml config. #1059
  • Proxying 403 http status into the application #1044
  • Normalize auto generated frontend-rule (docker) #1043
  • Traefik with Consul catalog backend + Registrator #1039
  • [Configuration help] Can't connect to docker containers under a domain path #1032
  • Kubernetes and etcd backend : storeconfig fails. #1031
  • kubernetes: Undefined backend 'X/' for frontend X/" #1026
  • TLS handshake error #1025
  • Traefik failing on POST request #1008
  • how config traffic.toml http 80 without basic auth, traefik WebUI 8080 with basic auth #1001
  • Docs 404 #995
  • Disable acme for non https endpoints #989
  • Add parameter to configure TLS entrypoints with ca-bundle file #984
  • docker multiple networks routing #970
  • don't add Docker containers not on the same network as traefik #959
  • Multiple frontend routes #957
  • SNI based routing without TLS offloading #933
  • NEO4J + traefik proxy Issues #907
  • ACME OnDemand ignores entrypoint certificate #672
  • Ability to use self-signed certificates for local development #399

Merged pull requests:

v1.1.2 (2016-12-15)

Full Changelog

Fixed bugs:

  • Problem during HTTPS redirection #952
  • nil pointer with kubernetes ingress #934
  • ConsulCatalog and File not working #903
  • Traefik can not start #902
  • Cannot connect to Kubernetes server failed to decode watch event #532

Closed issues:

  • Updating certificates with configuration file. #968
  • Let's encrypt retrieving certificate from wrong IP #962
  • let's encrypt and dashboard? #961
  • Working HTTPS example for GKE? #960
  • GKE design pattern #958
  • Consul Catalog constraints does not seem to work #954
  • Issue in building traefik from master #949
  • Proxy http application to https doesn't seem to work correctly for all services #937
  • Excessive requests to kubernetes apiserver #922
  • I am getting a connection error while creating traefik with consul backend "dial tcp 127.0.0.1:8500: getsockopt: connection refused" #917
  • SwarmMode - 1.13 RC2 - DNS RR - Individual IPs not retrieved #913
  • Panic in kubernetes ingress (traefik 1.1.0) #910
  • Kubernetes updating deployment image requires Ingress to be remade #909
  • [ACME] Too many currently pending authorizations #905
  • WEB UI Authentication and Let's Encrypt : error 404 #754
  • Traefik as ingress controller for SNI based routing in kubernetes #745
  • Kubernetes Ingress backend: using self-signed certificates #486
  • Kubernetes Ingress backend: can't find token and ca.crt #484

Merged pull requests:

v1.1.1 (2016-11-29)

Full Changelog

Implemented enhancements:

  • Getting "Kubernetes connection error failed to decode watch event : unexpected EOF" every minute in Traefik log #732

Fixed bugs:

  • 1.1.0 kubernetes panic: send on closed channel #877
  • digest auth example is incorrect #869
  • Marathon & Mesos providers' GroupsAsSubDomains option broken #867
  • 404 responses when a new Marathon leader is elected #653

Closed issues:

  • traefik:latest fails to auto-detect Docker containers #901
  • Panic error on bare metal Kubernetes (installed with Kubeadm) #897
  • api backend readOnly: what is the purpose of this setting #893
  • file backend: using external file - doesn't work #892
  • auth support for web backend #891
  • Basic auth with docker labels #890
  • file vs inline config #888
  • combine Host and HostRegexp rules #882
  • [Question] Traefik + Kubernetes + Let's Encrypt (ssl not used) #881
  • Traefik security for dashboard #880
  • Kubernetes Nginx Deployment Panic #879
  • Kubernetes Example Address already in use #872
  • ETCD Backend - frontend/backends missing #866
  • [Swarm mode] Dashboard does not work on RC4 #864
  • Docker v1.1.0 image does not exist #861
  • ConsulService catalog do not support multiple rules #859
  • Update official docker repo #858
  • Still a memory leak with k8s - 1.1 RC4 #844

Merged pull requests:

v1.1.0 (2016-11-17)

Full Changelog

Implemented enhancements:

  • Support healthcheck if present for docker #666
  • Standard unit for traefik latency in access log #559
  • [CI] wiredep marked as unmaintained #550
  • Feature Request: Enable Health checks to containers. #540
  • Feature Request: SSL Cipher Selection #535
  • Error with -consulcatalog and missing load balance method on 1.0.0 #524
  • Running Traefik with Docker 1.12 Swarm Mode #504
  • Kubernetes provider: should allow the master url to be override #501
  • [FRONTEND][LE] Pre-generate SSL certificates for "Host:" rules #483
  • Frontend Rule evolution #437
  • Add a Changelog #388
  • Add label matching for kubernetes ingests #363
  • Acme in HA Traefik Scenario #348
  • HTTP Basic Auth support #77
  • Session affinity / stickiness / persistence #5

Fixed bugs:

  • 1.1.0-rc4 dashboard UX not displaying #828
  • Traefik stopped serving on upgrade to v1.1.0-rc3 #807
  • cannot access webui/dashboard #796
  • Traefik cannot read constraints from KV #794
  • HTTP2 - configuration #790
  • Cannot provide multiple certificates using flag #757
  • Allow multiple certificates on a single entrypoint when trying to use TLS? #747
  • traefik * Users: unsupported type: slice #743
  • [Docker swarm mode] The traefik.docker.network seems to have no effect #719
  • traefik hangs - stops handling requests #662
  • Add long jobs in exponential backoff providers #626
  • Tip of tree crashes on invalid pointer on Marathon provider #624
  • ACME: revoke certificate on agreement update #579
  • WebUI: Providers tabs disappeared #577
  • traefik version command contains incorrect information when building from master branch #569
  • Case sensitive domain names breaks routing #562
  • Flag --etcd.endpoint default #508
  • Conditional ACME on demand generation #505
  • Important delay with streams (Mozilla EventSource) #503
  • Traefik crashing #458
  • traefik.toml constraints error: Expected map but found 'string'. #451
  • Multiple path separators in the url path causing redirect #167

Closed issues:

  • All path rules require paths to be lowercase #851
  • The UI stops working after a time and have to restart the service. #840
  • Incorrect Dashboard page returned #831
  • LoadBalancing doesn't work in single node Swarm-mode #815
  • cannot connect to docker daemon #813
  • Let's encrypt configuration not working #805
  • Multiple subdomains for Marathon backend. #785
  • traefik-1.1.0-rc1: build error #781
  • dependencies installation error #755
  • k8s provider w/ acme? #752
  • Swarm Docs - How to use a FQDN #744
  • Documented ProvidersThrottleDuration value is invalid #741
  • Sensible configuration for consulCatalog #737
  • Traefik ignoring container listening in more than one TCP port #734
  • Loadbalaning issues with traefik and Docker Swarm cluster #730
  • issues with marathon app ids containing a dot #726
  • Error when using HA acme in kubernetes with etcd #725
  • [Docker swarm mode] No round robin when using service #718
  • Dose it support docker swarm mode #712
  • Kubernetes - Undefined backend #710
  • How Routing traffic depending on path not domain in docker #706
  • Constraints on Consul Catalogue not working as expected #703
  • Global InsecureSkipVerify does not work #700
  • Traefik crashes when using Consul catalog #699
  • [documentation/feature] Consul/etcd support atomic multiple key changes now #698
  • How to configure which network to use when starting traefik binary? #694
  • How to get multiple host headers working for docker labels? #692
  • Requests with URL-encoded characters are not forwarded correctly #684
  • File Watcher for rules does not work #683
  • Issue with global InsecureSkipVerify = true and self signed certificates #667
  • Docker exposedbydefault = false didn't work #663
  • swarm documentation needs update #656
  • [ACME] Auto SAN Detection #655
  • Fronting a domain with DNS A-record round-robin & ACME #654
  • Overriding toml configuration with environment variables #650
  • marathon provider exposedByDefault = false #647
  • Add status URL for service up checks #642
  • acme's storage file, containing private key, is word readable #638
  • wildcard domain with exclusions #633
  • Enable evenly distribution among backend #631
  • Traefik sporadically failing when proxying requests #615
  • TCP Proxy #608
  • How to use in Windows? #605
  • ClientCAFiles ignored #604
  • Let`s Encrypt enable in etcd #600
  • Support HTTP Basic Auth #599
  • Consul KV seem broken #587
  • HTTPS entryPoint not working #574
  • Traefik stuck when used as frontend for a streaming API #560
  • Exclude some frontends in consul catalog #555
  • Update docs with new Mesos provider #548
  • Can I use Traefik without a domain name? #539
  • docker run syntax in swarm example has changed #528
  • Priortities in 1.0.0 not behaving #506
  • Route by path #500
  • Secure WebSockets #467
  • Container IP Lost #375
  • Multiple routes support with Docker or Marathon labels #118

Merged pull requests:

v1.1.0-rc4 (2016-11-10)

Full Changelog

Implemented enhancements:

  • Feature Request: Enable Health checks to containers. #540

Fixed bugs:

  • Traefik stopped serving on upgrade to v1.1.0-rc3 #807
  • Traefik cannot read constraints from KV #794
  • HTTP2 - configuration #790
  • Allow multiple certificates on a single entrypoint when trying to use TLS? #747

Closed issues:

  • LoadBalancing doesn't work in single node Swarm-mode #815
  • cannot connect to docker daemon #813
  • Let's encrypt configuration not working #805
  • Question: Wildcard Host for Kubernetes Ingress #792
  • Multiple subdomains for Marathon backend. #785
  • traefik-1.1.0-rc1: build error #781
  • Multiple routes support with Docker or Marathon labels #118

Merged pull requests:

v1.1.0-rc3 (2016-10-26)

Full Changelog

Fixed bugs:

  • Cannot provide multiple certificates using flag #757
  • traefik * Users: unsupported type: slice #743
  • [Docker swarm mode] The traefik.docker.network seems to have no effect #719
  • Case sensitive domain names breaks routing #562

Closed issues:

  • dependencies installation error #755
  • k8s provider w/ acme? #752
  • Documented ProvidersThrottleDuration value is invalid #741
  • Loadbalaning issues with traefik and Docker Swarm cluster #730
  • issues with marathon app ids containing a dot #726
  • How Routing traffic depending on path not domain in docker #706
  • Traefik crashes when using Consul catalog #699
  • File Watcher for rules does not work #683

Merged pull requests:

v1.1.0-rc2 (2016-10-17)

Full Changelog

Implemented enhancements:

  • Support healthcheck if present for docker #666

Closed issues:

  • Sensible configuration for consulCatalog #737
  • Traefik ignoring container listening in more than one TCP port #734
  • Error when using HA acme in kubernetes with etcd #725
  • [Docker swarm mode] No round robin when using service #718
  • Dose it support docker swarm mode #712
  • Kubernetes - Undefined backend #710
  • Constraints on Consul Catalogue not working as expected #703
  • docker run syntax in swarm example has changed #528
  • Secure WebSockets #467

Merged pull requests:

v1.1.0-rc1 (2016-09-30)

Full Changelog

Implemented enhancements:

  • Feature Request: SSL Cipher Selection #535
  • Error with -consulcatalog and missing load balance method on 1.0.0 #524
  • Running Traefik with Docker 1.12 Swarm Mode #504
  • Kubernetes provider: should allow the master url to be override #501
  • [FRONTEND][LE] Pre-generate SSL certificates for "Host:" rules #483
  • Frontend Rule evolution #437
  • Add a Changelog #388
  • Add label matching for kubernetes ingests #363
  • Acme in HA Traefik Scenario #348
  • HTTP Basic Auth support #77
  • Session affinity / stickiness / persistence #5
  • Kubernetes provider: traefik.frontend.rule.type logging #668 (yvespp)

Fixed bugs:

  • traefik hangs - stops handling requests #662
  • Add long jobs in exponential backoff providers #626
  • Tip of tree crashes on invalid pointer on Marathon provider #624
  • ACME: revoke certificate on agreement update #579
  • WebUI: Providers tabs disappeared #577
  • traefik version command contains incorrect information when building from master branch #569
  • Flag --etcd.endpoint default #508
  • Conditional ACME on demand generation #505
  • Important delay with streams (Mozilla EventSource) #503
  • Traefik crashing #458
  • traefik.toml constraints error: Expected map but found 'string'. #451
  • Multiple path separators in the url path causing redirect #167

Closed issues:

  • Global InsecureSkipVerify does not work #700
  • [documentation/feature] Consul/etcd support atomic multiple key changes now #698
  • How to configure which network to use when starting traefik binary? #694
  • How to get multiple host headers working for docker labels? #692
  • Requests with URL-encoded characters are not forwarded correctly #684
  • Issue with global InsecureSkipVerify = true and self signed certificates #667
  • Docker exposedbydefault = false didn't work #663
  • [ACME] Auto SAN Detection #655
  • Fronting a domain with DNS A-record round-robin & ACME #654
  • Overriding toml configuration with environment variables #650
  • marathon provider exposedByDefault = false #647
  • Add status URL for service up checks #642
  • acme's storage file, containing private key, is word readable #638
  • wildcard domain with exclusions #633
  • Enable evenly distribution among backend #631
  • Traefik sporadically failing when proxying requests #615
  • TCP Proxy #608
  • How to use in Windows? #605
  • ClientCAFiles ignored #604
  • Let`s Encrypt enable in etcd #600
  • Support HTTP Basic Auth #599
  • Consul KV seem broken #587
  • HTTPS entryPoint not working #574
  • Traefik stuck when used as frontend for a streaming API #560
  • Exclude some frontends in consul catalog #555
  • Can I use Traefik without a domain name? #539
  • Priortities in 1.0.0 not behaving #506
  • Route by path #500
  • Container IP Lost #375

Merged pull requests:

v1.0.2 (2016-08-02)

Full Changelog

Fixed bugs:

  • ACME: revoke certificate on agreement update #579

Closed issues:

  • Exclude some frontends in consul catalog #555

Merged pull requests:

v1.0.1 (2016-07-19)

Full Changelog

Implemented enhancements:

  • Error with -consulcatalog and missing load balance method on 1.0.0 #524
  • Kubernetes provider: should allow the master url to be override #501

Fixed bugs:

  • Flag --etcd.endpoint default #508
  • Conditional ACME on demand generation #505
  • Important delay with streams (Mozilla EventSource) #503

Closed issues:

  • Can I use Traefik without a domain name? #539
  • Priortities in 1.0.0 not behaving #506
  • Route by path #500

Merged pull requests:

v1.0.0 (2016-07-05)

Full Changelog

Fixed bugs:

  • Enable to define empty TLS option by flag for Let's Encrypt #488
  • [Docker] No IP in backend in host networking mode #487
  • Response is compressed when not requested #485
  • loadConfig modifies configuration causing same config check to fail #480

Closed issues:

  • svg logo #482
  • etcd tries to connect with TLS even with --etcd.tls=false #456
  • Zookeeper - KV connection error: Failed to test KV store connection #455
  • "Not Found" api response needed instead of 404 #454
  • domain label doesn't work on docker #447
  • Any chance of a windows release? #425

Merged pull requests:

v1.0.0-rc3 (2016-06-23)

Full Changelog

Implemented enhancements:

  • support more than one rule to Docker backend #419

Fixed bugs:

  • consulCatalog issue when serviceName contains a dot #475
  • Issue with empty responses #463
  • Severe memory leak in beta.470 and beyond crashes Traefik server #462
  • Marathon that starts with a space causes parsing errors. #459
  • A frontend route without a rule (or empty rule) causes a crash when traefik starts #453
  • container dropped out when connecting to Docker Swarm #442
  • Traefik setting Accept-Encoding: gzip on requests (Traefik may also be broken with chunked responses) #421

Closed issues:

  • HTTP headers case gets modified #466
  • File frontend > Marathon Backend #465
  • Websocket: Unable to hijack the connection #452
  • kubernetes: Received event spamming? #449
  • kubernetes: backends not updated when i scale replication controller? #448
  • Add href link on frontend #436
  • Multiple Domains Rule #430

Merged pull requests:

v1.0.0-rc2 (2016-06-07)

Full Changelog

Implemented enhancements:

Fixed bugs:

  • Panic on help #429
  • Bad default values in configuration #427

Closed issues:

  • Traefik doesn't listen on IPv4 ports #434
  • Not listening on port 80 #432
  • docs need updating for new frontend rules format #423
  • Does traefik supports for Mac? (For devlelopment) #417

Merged pull requests:

* This Change Log was automatically generated by gcg